CYBER SECURITY
VIDHI SURWADE
STD:11TH C
ROLL NO: 42
INTRODUCTION
Cyber security is the
practice of defending
computers, servers, mobile
devices, electronic systems,
networks, and data from
malicious attacks. It's also
known as information
technology security or
electronic information
security. The term applies
in a variety of contexts,
from business to mobile
computing, and can be
divided into a few common
categories.
WHAT IS…….?
Network security is the practice of securing a computer network from
intruders, whether targeted attackers or opportunistic malware.
Application security focuses on keeping software and devices free of
threats. A compromised application could provide access to the data its
designed to protect. Successful security begins in the design stage, well
before a program or device is deployed.
Information security protects the integrity and privacy of data, both in
storage and in transit.
Operational security includes the processes and decisions for
handling and protecting data assets. The permissions users have when
accessing a network and the procedures that determine how and where
data may be stored or shared all fall under this umbrella.
CYBER CRIME!!
Cybercrime is criminal activity
that either targets or uses a
computer, a computer network
or a networked device. Most
cybercrime is committed by
cybercriminals or hackers who
want to make money.
However, occasionally
cybercrime aims to damage
computers or networks for
reasons other than profit.
These could be political or
personal.
CYBER CRIME INCLUDES!!
• Email and internet fraud
• Identity fraud (where personal information is stolen and used)
• Theft of financial or card payment data
• Theft and sale of corporate data
• Cyberextortion (demanding money to prevent a threatened attack)
• Ransomware attacks (a type of cyberextortion)
• Social engineering
• Software vulnerability exploits
HOW CAN WE PROTECT?
Read privacy policy carefully when you submit the data
through internet.
Encryption: lots of website uses SSL (secure socket layer)
to encrypt a data.
Disable remote connectivity.
HISTORY
1940s: The time before crime
1950s: The phone phreaks
1960s: All quiet on the Western Front
1970s: Computer security is born
1980s: From ARPANET to internet
1990s: The world goes online
2000s: Threats diversify and multiply
2010s: The next generation